Логотип exploitDog
bind:"CVE-2019-9513" OR bind:"CVE-2019-9511"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-9513" OR bind:"CVE-2019-9511"

Количество 37

Количество 37

redhat логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2019-9513

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2019-9511

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3p35-64mh-v96v

около 3 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-02997

почти 6 лет назад

Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, сетевых программных средств Envoy, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-89fc-749h-w2fj

около 3 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-03782

больше 6 лет назад

Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-02994

почти 6 лет назад

Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
oracle-oval логотип

ELSA-2020-5862

больше 4 лет назад

ELSA-2020-5862: olcne nginx security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5859

больше 4 лет назад

ELSA-2020-5859: olcne nginx security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14246-1

больше 5 лет назад

Security update for Mozilla Firefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
msrc логотип
CVE-2019-9513

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
14%
Средний
почти 6 лет назад
redhat логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
14%
Средний
почти 6 лет назад
nvd логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
14%
Средний
почти 6 лет назад
msrc логотип
CVE-2019-9511

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
14%
Средний
почти 6 лет назад
debian логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation ...

CVSS3: 7.5
14%
Средний
почти 6 лет назад
github логотип
GHSA-3p35-64mh-v96v

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
4%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-02997

Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, сетевых программных средств Envoy, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
github логотип
GHSA-89fc-749h-w2fj

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
14%
Средний
около 3 лет назад
fstec логотип
BDU:2019-03782

Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
14%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-02994

Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
14%
Средний
почти 6 лет назад
oracle-oval логотип
ELSA-2020-5862

ELSA-2020-5862: olcne nginx security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2020-5859

ELSA-2020-5859: olcne nginx security update (IMPORTANT)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2019:14246-1

Security update for Mozilla Firefox

больше 5 лет назад

Уязвимостей на страницу